E-Business Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An IPv4 address is expressed as a:

32-bit number that appears as a series of four separate numbers separated by periods.

In the United States, about ________ of Internet traffic now occurs over Internet Protocol version 6 (IPv6).

40%

Which of the following statements about blockchain is not true?

A blockchain system is inherently centralized.

Which of the following situations would not qualify for the fair use exception to U.S. copyright law?

A student copies a photograph of his favorite band from a website created by the band's record label and places it on the student's personal website.

Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device?

AWD

________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce.

Application servers

Which of the following cases has chipped away at the Digital Millennium Copyright Act (DMCA) safe harbor protection?

BMG Rights Management v. Cox Communications

A ________ is a repository of customer information that records all contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM system

Which of the FTC's Fair Information Practices (FIP) principles requires opt-in or opt-out policies to be in place?

Choice/Consent

Which of the following is a core Fair Information Practices (FIP) principle?

Choice/Consent

Which of the following used a video coupled with an interactive game for smartphone users to increase awareness of its brand?

Domino's Pizza

All of the following are examples of an open-source web content management system (WCMS) except:

Dreamweaver CC.

Which of the following is not one of the basic technological foundations of the Internet?

FTP

Which of the following Facebook marketing features did Tonal use to motivate and interact with customers?

Facebook Groups

Which of the following cannot be used to retrieve objects from a database?

HTML

________ is an open-source database that can store and analyze both structured and unstructured data.

Hadoop

Which of the following coordinates the Internet's system of unique identifiers?

ICANN

What is the first step in analyzing an ethical dilemma?

Identify and describe the facts.

Which of the following is not a characteristic of a nearly perfect competitive market?

It is highly regulated.

Applications for Android operating system-based smartphones are typically written in which of the following?

Java

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

Notice/Awareness

Which of the following is not true about on-demand service firms?

On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

A browser parasite is an example of which of the following?

PUP

What is the first step in developing an e-commerce security plan?

Perform a risk assessment.

Which of the following protocols does Facebook use for more than 75% of its Internet traffic?

QUIC

Which of the following is a simple but powerful method for describing a firm's strengths and weaknesses?

SWOT

The concept of a "sprint" is related to which of the following development methodologies?

Scrum

On-demand service firms are a totally new phenomenon without precedent in the history of e-commerce.

SimplyHired

Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?

Slippery Slope

Google uses which of the following to build a global database of wireless access points and their geographic locations?

Street View cars

Which of the following is a programming language introduced by Apple specifically for developing iOS applications?

Swift

Which of the following is the core communications protocol for the Internet?

TCP/IP

Which of the following statements is not true?

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

________ was the first truly large-scale digitally enabled transaction system in the B2C arena.

The French Minitel

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

The Golden Rule

TCP/IP operates in which layer of Internet architecture?

Transport Services and Representation Standards layer

Which of the following is most similar to Pinterest?

Tumblr

Which of the following Twitter marketing tools involves a coupon or other promotional offer that appears in users' Twitter timeline?

Twitter Card

Which of the following is at the very heart of a company's business model?

Value proposition

The protocol that enables the transmission of voice and other forms of audio communication over the Internet is called:

VoIP

Which of the following standards provide for high-speed short-range Wi-Fi?

WiGig

Which of the following is the top app in terms of percentage reach?

YouTube

All of the following are basic functionality provided by web servers except:

a shopping cart.

How much time a month does the average U.S. adult spend on TikTok?

about 22 hours

Where does TLS operate within TCP/IP?

between the Internet Layer and the Transport Layer

Face ID is an example of which of the following?

biometrics

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

Which of the following measures the percentage of e-mails that could not be delivered?

bounce-back rate

All of the following are challenges for catalog merchants except:

building sophisticated order entry and fulfillment systems.

Advantages of dynamic page generation include all of the following except:

client-side execution of programming.

Which of the following is the most important tool in establishing a relationship with the customer?

company website

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of:

cybersquatting

Which of the following best defines e-commerce?

digitally enabled commercial transactions between and among organizations and individuals

Innovative entrepreneurs and their business firms that destroy existing business models are referred to as:

disruptors

Which of the following basic ethical concepts plays an important role in defining privacy?

due process

What is another name for pro forma earnings?

earnings before income taxes, depreciation, and amortization (EBITDA)

If you wished to leverage the ubiquitous nature of the Web to differentiate your product, you would:

enable individual customization of the product by consumers.

Which of the following involves using a variety of tools to encourage users to interact with content and brand?

engagement

All of the following are advantages of online retail except:

faster delivery of goods.

Which of the following is not a main factor in determining the overall demand on an e-commerce site?

file sizes of web pages being served

A strategy designed to compete within a narrow market or product segment is called a ________ strategy.

focus

Which of the following involves a company giving away a certain level of product or services without charge, but then charging a fee for premium levels of the product or service?

freemium strategy

The California Consumer Privacy Act (CCPA) and the California Privacy Rights and Enforcement Act (CPRA) together do all of the following except:

give residents the right to prevent government access to their personal information.

SupplyOn is an example of a(n):

industry consortium

Which of the followingrefers to any disparity in relevant market information among parties in a transaction?

information asymmetry

Which dimensions of security is spoofing a threat to?

integrity and authenticity

All of the following statements about patents are true except:

it is more difficult to obtain a copyright than it is to obtain a patent.

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

logical design

The incremental cost of building the next unit of a good is called the:

marginal cost.

Building which of the following is the least expensive path to creating a mobile presence?

mobile website

Which of the following has the second-highest share of online retail sales?

omnichannel merchants

PayPal is an example of which of the following types of payment system?

online stored value payment system

MySQL is which of the following?

open-source database software

All of the following are used for authentication except:

packet filters.

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for a period of time, typically 20 years?

patent law

View-to-cart ratio is a measure of the:

percentage of views that lead to an add-to-cart action.

Acquisition rate is a measure of the:

percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

All of the following are strategic factors that pertain specifically to a firm and its related businesses except:

power of customers.

Confidentiality is sometimes confused with:

privacy

Asymmetric key cryptography is also known as:

public key cryptography.

Which of the following is another term for amplification?

reach

A firm's ________ describes how a firm will produce a superior return on invested capital.

revenue model

All of the following are forms of display ads except:

rich media ads.

Which of the following refers to the number of interactions among members of a group and reflects the "connectedness" of the group, even if these connections are forced on users?

social density

Which of the following types of attacks resulted in a data breach at the online trading firm Robinhood that exposed the data of 6 million customers?

social engineering

Which of the following e-commerce technology dimensions creates greater opportunities for cyberbullying?

social technology

Which of the following measures the average length of stay at a website?

stickiness

Uber has been criticized for using which of the following?

surge pricing

Above all, e-commerce is a ________ phenomenon.

technology driven

Next generation firewalls provide all of the following except:

the ability to automatically update applications on a client computer with security patches.

Which of the following factors is not a significant influence on a company's competitive environment?

the availability of supportive organizational structures

The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

A perfect market is one in which:

there are no competitive advantages or asymmetries because all firms have equal access to all the factors to production.

A ________ marketplace supplies products and services of interest to a particular industry.

vertical

A social consequence of the richness of Internet information is:

very persuasive messages might reduce the need for multiple independent sources of information.

Which of the following is the preferred method of implementing a service-oriented architecture?

web services

Which of the following refers to the practice of researching a product online before purchasing it at a physical store?

webrooming

Conficker is an example of a:

worm

Which of the following is an example of a violation of your online privacy?

your online purchasing history being sold to other merchants without your consent


Ensembles d'études connexes

Chapter 10: Standard Costs and variances

View Set

ACCT301 Test 2 Ch 7 Cash & Receivables

View Set

{Word} Session 3 Fill in the Blanks

View Set

Connecticut life and health state exam simulator

View Set

Econ 101 McGraw Hill Ch 9 Aggregate Demand and Aggregate Supply

View Set

Self in social context - 9 - Self-monitoring (SM)

View Set

B.3.3 FC0-U61 Domain 3: Applications and Software

View Set

COBA Core Econ 2010, Acct 2050 test bank questions, COBA Core MKTG 2400, COBA Core MGT 3680 Review, FIN 343, COBA Core Acct 2060, COBA Core Econ 2020, BUS 3265 Test Bank Questions

View Set

Social Cognition Quiz- Social Psychology Chapter 3

View Set